Using a nearly 20-year-old file transfer product - what could go wrong? Among the many lessons to be learned from the Accellion File Transfer Appliance mess is this: Attackers will devote substantial resources to reverse-engineer hardware, software or a service if there's a financial upside.
In an eye-opening look at the cost burden of a ransomware attack, Universal Health Services reports that an incident last September had a $67 million economic impact - citing, for example, the need to divert patients to competing facilities for urgent care. But insurance may cover much of the cost.
State-sponsored groups in China appear to be targeting India’s power supply by dropping malware into systems, according to online digital threat analysis company Recorded Future. The Indian government says it has taken steps to mitigate the risks.
The mobile channel saw great user adoption in 2020 – and it saw a corresponding increase in fraud incidents. Tim Dalgleish of BioCatch discusses mobile fraud trends and the role of behavioral biometrics in enhancing user authentication.
In this interview with ISMG, Dalgleish discusses:
Mobile adoption and fraud...
Cyberattacks can cause devastating
business disruptions and lead to
financial losses reaching hundreds
of millions of dollars.
The World Economic Forum’s 2020 Global Risk Report ranked
cyberattacks causing disruption to operations and critical infrastructure
among the top five increasing global risks....
Prolific Ryuk ransomware has a new trick up its sleeve. "A Ryuk sample with worm-like capabilities - allowing it to spread automatically within networks it infects" was recently discovered during an incident response effort, warns CERT-FR, the French government's computer emergency response team.
Two Indian vaccine makers and an Oxford University lab are reportedly among the latest targets of hackers apparently seeking to steal COVID-19 research data.
A critical authentication bypass vulnerability could enable hackers to remotely compromise programmable logic controllers made by industrial automation giant Rockwell Automation, according to the cybersecurity company Claroty. Rockwell has issued mitigation recommendations.
As more and more people work and socialize exclusively online, protecting your digital identity is more important than ever. Will this finally be the tipping point that causes people to show more concern for their online data?
Download the full report to learn more from your peers and ensure you don’t make the...
Ransomware continues to sting numerous organizations, and the problem only seems to be getting worse. More than ever, the onus is on potential victims to ensure they have essential defenses in place - and if possible, to proactively hunt for attackers who may already be inside their network.
Microsoft is making available the CodeQL queries it used to detect malicious implants in the massive supply chain attack that affected SolarWinds, tech firms and government agencies.
Microsoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites that use a malicious font. The flaw was found by Google's Project Zero bug-hunting team.
El coste medio global de las amenazas internas ha aumentado un 31 % en dos años, llegando a los 11,45 millones de dólares. Y la frecuencia de estos incidentes se ha incrementado un 47 % durante el mismo período.
Este informe del Ponemon Institute describe en detalle los centros de costes principales para las...
La mancanza di conoscenza può danneggiare non solo i tuoi utenti, ma anche l'azienda nel suo complesso.
Ecco perché abbiamo condotto un'indagine globale per valutare due aspetti fondamentali della vulnerabilità degli utenti: cosa sanno e cosa fanno. L'edizione 2020 del nostro Report sui rischi legati agli utenti...
Face à la dispersion croissante des effectifs, le périmètre traditionnel du réseau d'entreprise a disparu. L'évolution de la dynamique de travail oblige à prendre en compte toute une nouvelle série de considérations sur la cybersécurité, où les collaborateurs représentent le nouveau périmètre.
Il est...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.